CVE-2012-0805
python-sqlalchemy: SQL injection flaw due to not checking LIMIT input for correct type
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function.
Múltiples vulnerabilidades de inyección SQL en SQLAlchemy antes v0.7.0b4, tal y como se usa en Keystone, permite a atacantes remotos ejecutar comandos SQL a través de las palabras clave (1) limit (límite) o (2) offset (desplazamiento) a la función de select (selección), o de vectores no especificados a las funciones (3) select.limit o (4) select.offset.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2012-01-19 CVE Reserved
- 2012-03-07 CVE Published
- 2024-06-24 EPSS Updated
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://www.sqlalchemy.org/changelog/CHANGES_0_7_0 | X_refsource_confirm | |
https://bugs.launchpad.net/keystone/+bug/918608 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73756 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://www.sqlalchemy.org/trac/changeset/852b6a1a87e7 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2012-0369.html | 2018-01-18 | |
http://secunia.com/advisories/48327 | 2018-01-18 | |
http://secunia.com/advisories/48328 | 2018-01-18 | |
http://secunia.com/advisories/48771 | 2018-01-18 | |
http://www.debian.org/security/2012/dsa-2449 | 2018-01-18 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:059 | 2018-01-18 | |
https://access.redhat.com/security/cve/CVE-2012-0805 | 2012-03-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=783305 | 2012-03-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | <= 0.7.0 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version " <= 0.7.0" | b3 |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.0 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.0" | - |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.0 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.0" | beta1 |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.0 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.0" | beta2 |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.0 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.0" | beta3 |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.1 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.1" | - |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.2 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.2" | - |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.3 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.3" | - |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.4 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.4" | - |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.5 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.5" | - |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.6 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.6" | - |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.6.7 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.7" | - |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.7.0 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.7.0" | b1 |
Affected
| ||||||
Sqlalchemy Search vendor "Sqlalchemy" | Sqlalchemy Search vendor "Sqlalchemy" for product "Sqlalchemy" | 0.7.0 Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.7.0" | b2 |
Affected
|